PerfWeb: How to Violate Web Privacy with Hardware Performance Events
نویسندگان
چکیده
The browser history reveals highly sensitive information about users, such as financial status, health conditions, or political views. Private browsing modes and anonymity networks are consequently important tools to preserve the privacy not only of regular users but in particular of whistleblowers and dissidents. Yet, in this work we show how a malicious application can infer opened websites from Google Chrome in Incognito mode and from Tor Browser by exploiting hardware performance events (HPEs). In particular, we analyze the browsers’ microarchitectural footprint with the help of advanced Machine Learning techniques: k-th Nearest Neighbors, Decision Trees, Support Vector Machines, and in contrast to previous literature also Convolutional Neural Networks. We profile 40 different websites, 30 of the top Alexa sites and 10 whistleblowing portals, on two machines featuring an Intel and an ARM processor. By monitoring retired instructions, cache accesses, and bus cycles for at most 5 seconds, we manage to classify the selected websites with a success rate of up to 86.3%. The results show that hardware performance events can clearly undermine the privacy of web users. We therefore propose mitigation strategies that impede our attacks and still allow legitimate use of HPEs.
منابع مشابه
Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services
Network neutrality is a hot topic since a few years and involves different aspects of interest (e.g. economic, regulatory, and privacy) for a wide range of stakeholders, including policy makers, researchers, economists, and service providers. When referring to video streaming, a killer web service of the Internet, much has been discussed regarding if and how video providers violate or may viola...
متن کاملTowards Privacy-Preserving Web Metering via User-Centric Hardware
Privacy is a major issue today as more and more users are connecting and participating in the Internet. This paper discusses privacy issues associated with web metering schemes and explores the dilemma of convincing interested parties of the merits of web metering results with sufficient detail, and still preserving users’ privacy. We analyse different categories of web metering schemes using a...
متن کاملSurvey on JavaScript security policies and their enforcement mechanisms in a web browser
We observe a rapid growth of web-based applications every day. These applications are executed in the web browser, where they interact with a variety of information belonging to the user. The dynamism of web applications is provided by the use of web scripts, and in particular JavaScript, that accesses this information through a browserprovided set of APIs. Unfortunately, some of the scripts us...
متن کاملSharing information in teams: giving up privacy or compromising on team performance?
Human teamwork can be supported by agent technology by providing each human team member with an agent that monitors, supports and advices the human. The agent can, for example, monitor the human’s workload, and share that information with (agents of) other team members so that work can be distributed effectively. However, though sharing information can lead to a higher team performance, it may ...
متن کاملThe Impact of Passive DNS Collection on End-user Privacy
There are two distinct problems in determining the impact of passive DNS (pDNS) on end-user privacy. One is whether or not pDNS would allow the observer to reconstruct an individual end-user’s DNS behavior. The other is if DNS behavior constitutes personally identifiable information (PII) or is otherwise legally protected. This paper develops a framework to discuss both aspects of the privacy i...
متن کامل